Contributor: Avdhoot Patil
New methods to entice victims into handing over their personal information are always being devised by the people behind phishing websites and the use of fake socia
Month: March 2013
One threat has evolved and dominated the threats landscape like no other: botnets. Practically every day a new set of online criminals attempt to exploit users in some way or the other. The best wa
A big thank you to all the folks that came to my presentation at the Troux World Conference last week. We had a full room of enterprise architects and EA consultants. Thank you for all your support
Backdoor found that uses Evernote account for setup—and possibly to steal data.